CYBERKNIFE 2020 : Cyberknife - Workshop of InfoSec and Data Leakage Protection and Prevention
Call For Papers
The Cyberknife – Workshop of InfoSec, Data Leakage Protection & Prevention, will be held in conjunction with the 12th Conference on Enterprise Information Systems (CENTERIS – https://centeris.scika.org/)
October 21 – October 23, 2020, Vilamoura, Algarve, Portugal
Papers accepted by the workshop will be published in Elsevier as a Procedia Computer Science series volume (which series are indexed by Scopus and Clarivate Conference Proceedings Citation Index - Web of Science (former ISI Thomson) and will be available on Sciverse ScienceDirect.
Moreover, the extended versions of all accepted papers will be invited to enhance their manuscripts for inclusion in a book of chapters or in a journal.
With the constant rise of products and services available through the web, the fact that these operate with sensible user information and data, harmful entities and subjects are increasingly active in the virtual world. With improving defensive methods cybercriminals recur to extremely sophisticated methods to perform their malicious activities. While protecting the privacy of users, many technologies found in current malware and network attacks have been abused in order to allow criminals to carry out their undertakings unobserved. This poses a lot of new challenges for digital forensics analysts, academics, law enforcement agencies (LEAs), and security professionals.
The aim of the Cyberknife – Workshop of InfoSec, Data Leakage Protection & Prevention is to bring together researchers, practitioners, tech companies, law enforcement agencies/representatives, and security professionals in the area of information security forensics and data privacy. This Workshop aims present a more complete picture on novel research regarding information security, data leakage protection and prevention challenges and how criminals undertake their actions.
Workshop Topics and Areas of Interest
*Artificial Intelligence in Cybersecurity
*Big data and cybersecurity
*Business continuity and disaster recovery
*Child safety in the cyberspace
*Critical infrastructure security
*Cybersecurity and cyber resilience
*Digital currency, blockchains and cybercrime
*Embedded systems security
*Healthcare information security
*Information security governance
*Internet of things security
*Law, investigation, internet jurisdiction and ethics
*Software development security
*Surveillance, interception, blocking and sovereignty